Authentication in a layered security approach for mobile ad hoc networks
نویسندگان
چکیده
منابع مشابه
Authentication in a layered security approach for mobile ad hoc networks
An ad hoc network is a collection of nodes that do not need to rely on a predefined infrastructure to keep the network connected. Nodes communicate amongst each other using wireless radios and operate by following a peer-to-peer network model. In this article we investigate authentication in a layered approach, which results to multiple lines of defense for mobile ad hoc networks. The layered s...
متن کاملLayered security design for mobile ad hoc networks
When security of a given network architecture is not properly designed from the beginning, it is difficult to preserve confidentiality, authenticity, integrity and nonrepudiation in practical networks. Unlike traditional mobile wireless networks, ad hoc networks rely on individual nodes to keep all the necessary interconnections alive. In this article we investigate the principal security issue...
متن کاملAuthentication Scheme for Mobile Ad Hoc Networks
-The technological progress of recent years made available devices for a large audience, which is powerful enough to randomly form Mobile Ad Hoc Networks (MAHNWs). However the spread of MAHNWs is still obstructed by unsettled technical issues. Besides the topics related to the functionality of a MAHNW (e.g. location of mobile stations, routing protocols) the proliferation of the MAHNWs is condi...
متن کاملa hybrid routing method for mobile ad-hoc networks
mobile-ad-hoc-networks (manets) are self-configuring networks of mobile nodes, which communicate through wireless links. the infrastructure of a mobile ad hoc network (manet) has no routers for routing, and all nodes must share the same routing protocol to assist each other when transmitting messages. the main issues in manets include the mobility of the network nodes, the scarcity of computati...
متن کاملAn Efficient Security Approach in Mobile Ad Hoc Networks
Mobile ad hoc Networks (MANETs) is a network formed without any central administration which consists of mobile nodes that use a wireless interface to send packet data. Since the nodes in a network of this kind can serve as router sand hosts, they can forward packets on be-half of other nodes and run user applications. An efficient security approach in mobile ad hoc networks will be described i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers & Security
سال: 2007
ISSN: 0167-4048
DOI: 10.1016/j.cose.2006.12.011